Dynamic reconfiguration of encryption upon detection of intrusion
A technology of data and secret keys, applied in the direction of data exchange through path configuration, security devices, data exchange networks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] see figure 1 , in order to illustrate the present invention, the general situation of a wireless LAN and its interconnection with a network such as the Internet or the World Wide Web (Web) is shown in the figure. The wireless LAN is limited to an area 11 of one facility. The LAN includes wireless devices such as PCs 13 or personal digital assistants that transmit and receive radio frequency communications 15 via their respective antennas 23 via corresponding antennas 23 of an IEEE 802.11B protocol wireless hub 19, which The wireless hub 19 has an associated web server containing a secret key encryption routine (ENC) 21 for encrypting and decrypting wireless communications within the LAN so that the wireless communications are encrypted during wireless transmission within the LAN . A LAN server within the hub 19 communicates with the Internet 50 , for example via a suitable communication link 49 . Suppose an intruder's truck 25 is cruising the route 27 around the peri...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 